Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Authentication
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== In commercial products == [[File:GatewayTracingHologramLabel.jpg|thumb|A [[security hologram]] label on an electronics box for authentication]][[Consumer goods]] such as pharmaceuticals,<ref>{{Cite journal |last1=Kingsley |first1=Bryce J. |last2=Schaffer |first2=J. David |last3=Chiarot |first3=Paul R. |date=10 June 2024 |title=Electrospray deposition of physical unclonable functions for drug anti-counterfeiting |journal=Scientific Reports |language=en |volume=14 |issue=1 |page=13256 |bibcode=2024NatSR..1413256K |doi=10.1038/s41598-024-63834-x |issn=2045-2322 |pmc=11164866 |pmid=38858516}}</ref> perfume, and clothing can use all forms of authentication to prevent counterfeit goods from taking advantage of a popular brand's reputation. As mentioned above, having an item for sale in a reputable store implicitly attests to it being genuine, the first type of authentication. The second type of authentication might involve comparing the quality and craftsmanship of an item, such as an expensive handbag, to genuine articles. The third type of authentication could be the presence of a [[trademark]] on the item, which is a legally protected marking, or any other identifying feature which aids consumers in the identification of genuine brand-name goods. With software, companies have taken great steps to protect from counterfeiters, including adding holograms, security rings, security threads and color shifting ink.<ref>{{Cite journal |last1=Haleem |first1=Abid |last2=Javaid |first2=Mohd |last3=Singh |first3=Ravi Pratap |last4=Suman |first4=Rajiv |last5=Rab |first5=Shanay |date=2022 |title=Holography and its applications for industry 4.0: An overview |journal=Internet of Things and Cyber-Physical Systems |volume=2 |pages=42β48 |doi=10.1016/j.iotcps.2022.05.004 |issn=2667-3452 |doi-access=free}}</ref> Counterfeit products are often offered to consumers as being authentic. [[Counterfeit consumer goods]], such as electronics, music, apparel, and [[counterfeit medications]], have been sold as being legitimate. Efforts to control the [[supply chain]] and educate consumers help ensure that authentic products are sold and used. Even [[security printing]] on packages, labels, and nameplates, however, is subject to counterfeiting.<ref>{{Cite magazine |last=Graham |first=Marty |date=2007-02-07 |title=Fake Holograms a 3-D Crime Wave |url=https://www.wired.com/2007/02/2163064/ |access-date=2020-04-24 |magazine=Wired |issn=1059-1028}}</ref> In their anti-counterfeiting technology guide,<ref>{{Cite web |date=2021-02-26 |title=EUIPO Anti-Counterfeiting Technology Guide |url=https://www.euipo.europa.eu/en/publications/anti-counterfeiting-technology-guide |url-status=live |archive-url=https://web.archive.org/web/20210317234513/https://euipo.europa.eu/ohimportal/en/web/observatory/news/-/action/view/8550135 |archive-date=2021-03-17 |website=European Observatory on Infringements of Intellectual Property Rights}}</ref> the [[EUIPO]] Observatory on Infringements of Intellectual Property Rights categorizes the main anti-counterfeiting technologies on the market currently into five main categories: electronic, marking, chemical and physical, mechanical, and technologies for digital media.<ref>{{Cite web |last=Linsner |first=Bristows LLP-Marc |date=2 March 2021 |title=EUIPO Observatory publishes Anti-counterfeiting Technology Guide {{!}} Lexology |url=https://www.lexology.com/library/detail.aspx?g=91842dca-ae41-424a-867c-d8c9c53b68a0 |access-date=2021-03-18 |website=www.lexology.com |language=en}}</ref> Products or their packaging can include a variable [[QR Code]]. A QR Code alone is easy to verify but offers a weak level of authentication as it offers no protection against counterfeits unless scan data is analyzed at the system level to detect anomalies.<ref>{{Cite book |title=Survey of techniques for the fight against counterfeit goods and Intellectual Property Rights (IPR) infringement. |date=2015 |publisher=Publications Office |others=Baldini, Gianmarco., Nai Fovino, Igor., Satta, Riccardo., Tsois, Aris., Checchi, Enrico., European Commission. Joint Research Centre. |isbn=978-92-79-54543-6 |location=Luxembourg |oclc=948769705}}</ref> To increase the security level, the QR Code can be combined with a [[digital watermark]] or [[copy detection pattern]] that are robust to copy attempts and can be authenticated with a smartphone. A [[Secure cryptoprocessor|secure key storage device]] can be used for authentication in consumer electronics, network authentication, license management, supply chain management, etc. Generally, the device to be authenticated needs some sort of wireless or wired digital connection to either a host system or a network. Nonetheless, the component being authenticated need not be electronic in nature as an authentication chip can be mechanically attached and read through a connector to the host e.g. an authenticated ink tank for use with a printer. For products and services that these secure coprocessors can be applied to, they can offer a solution that can be much more difficult to counterfeit than most other options while at the same time being more easily verified.<ref name=":1" /> === Packaging === Packaging and labeling can be engineered to help reduce the risks of counterfeit consumer goods or the theft and resale of products.<ref>{{cite journal |last=Eliasson |first=C |author2=Matousek |date=2007 |title=Noninvasive Authentication of Pharmaceutical Products through Packaging Using Spatially Offset Raman Spectroscopy |journal=Analytical Chemistry |volume=79 |issue=4 |pages=1696β1701 |doi=10.1021/ac062223z |pmid=17297975}}</ref><ref>{{cite journal |last=Li |first=Ling |date=March 2013 |title=Technology designed to combat fakes in the global supply chain |journal=Business Horizons |volume=56 |issue=2 |pages=167β177 |doi=10.1016/j.bushor.2012.11.010}}</ref> Some package constructions are more difficult to copy and some have pilfer indicating seals. Counterfeit goods, unauthorized sales (diversion), material substitution and tampering can all be reduced with these anti-counterfeiting technologies. Packages may include authentication seals and use [[security printing]] to help indicate that the package and contents are not counterfeit; these too are subject to counterfeiting. Packages also can include anti-theft devices, such as dye-packs, [[Radio-frequency identification|RFID]] tags, or [[electronic article surveillance]]<ref>[http://electronics.howstuffworks.com/anti-shoplifting-device.htm How Anti-shoplifting Devices Work"] {{webarchive|url=https://web.archive.org/web/20060427081528/http://electronics.howstuffworks.com/anti-shoplifting-device.htm|date=2006-04-27}}, HowStuffWorks.com</ref> tags that can be activated or detected by devices at exit points and require specialized tools to deactivate. Anti-counterfeiting technologies that can be used with packaging include: * [[Taggant]] fingerprinting β uniquely coded microscopic materials that are verified from a database * Encrypted micro-particles β unpredictably placed markings (numbers, layers and colors) not visible to the human eye * [[Hologram]]s β graphics printed on seals, patches, foils or labels and used at the point of sale for visual verification * Micro-printing β second-line authentication often used on currencies * Serialized [[barcode]]s * UV printing β marks only visible under UV light * [[Track and trace]] systems β use codes to link products to the database tracking system * Water indicators β become visible when contacted with water * DNA tracking β genes embedded onto labels that can be traced * Color-shifting ink or film β visible marks that switch colors or texture when tilted * [[Tamper evident]] seals and tapes β destructible or graphically verifiable at point of sale * 2d barcodes β data codes that can be tracked * RFID chips * [[Near-field communication|NFC]] chips
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)